----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ------------------------------ ------------------------------ -------------
Debian Security Advisory DSA-2641-1 security@debian.org
http://www.debian.org/ security/ Salvatore Bonaccorso
March 09, 2013 http://www.debian.org/ security/faq
- ------------------------------ ------------------------------ -------------
Package : perl
Vulnerability : rehashing flaw
Problem type : remote
Debian-specific: no
CVE ID : CVE-2013-1667
Debian Bug : 702296
Yves Orton discovered a flaw in the rehashing code of Perl. This flaw
could be exploited to carry out a denial of service attack against code
that uses arbitrary user input as hash keys. Specifically an attacker
could create a set of keys of a hash causing a denial of service via
memory exhaustion.
For the stable distribution (squeeze), this problem has been fixed in
version 5.10.1-17squeeze6.
For the testing distribution (wheezy), and the unstable distribution
(sid), this problem has been fixed in version 5.14.2-19.
We recommend that you upgrade your perl packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/ security/
Mailing list: debian-security-announce@ lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iQEcBAEBAgAGBQJRO01lAAoJEFb2Gn lAHawEoVAH/ 2g7orgxovXN2SRAwDsaw1pD
MYIx/E9rPl+BEjEqlYOKC4SImJoB2+ pIv4p913jvZnknMU8e1U8TBqPEXdl7 f9Ko
oXucxiv2LWSf67c1yV5BY7OIeIG9vs xfn1YuS0CmmxlyzBoxUSM+ ZQ6SrHg9JRgc
1L5LOnAPF70u/ dwlRIO8hy3kmXazvCcbNRc4FDPvk+ pFXu1aiNwNGOC+LGou9JGA
ZdSs7YqFlR/gBGKxI4oESZMj5XT/ JnTqePyJX8oLQa5D+ WRnj5C9v1oBeinjUCpz
eUxz222nY/cOJOv6AoA/ f3YBrf2k4Xh1IRfZZ8Dr1EhKgwkOk8 V9PDuAmZ9ciC0=
=T27A
-----END PGP SIGNATURE-----
Hash: SHA1
- ------------------------------
Debian Security Advisory DSA-2641-1 security@debian.org
http://www.debian.org/
March 09, 2013 http://www.debian.org/
- ------------------------------
Package : perl
Vulnerability : rehashing flaw
Problem type : remote
Debian-specific: no
CVE ID : CVE-2013-1667
Debian Bug : 702296
Yves Orton discovered a flaw in the rehashing code of Perl. This flaw
could be exploited to carry out a denial of service attack against code
that uses arbitrary user input as hash keys. Specifically an attacker
could create a set of keys of a hash causing a denial of service via
memory exhaustion.
For the stable distribution (squeeze), this problem has been fixed in
version 5.10.1-17squeeze6.
For the testing distribution (wheezy), and the unstable distribution
(sid), this problem has been fixed in version 5.14.2-19.
We recommend that you upgrade your perl packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/
Mailing list: debian-security-announce@
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iQEcBAEBAgAGBQJRO01lAAoJEFb2Gn
MYIx/E9rPl+BEjEqlYOKC4SImJoB2+
oXucxiv2LWSf67c1yV5BY7OIeIG9vs
1L5LOnAPF70u/
ZdSs7YqFlR/gBGKxI4oESZMj5XT/
eUxz222nY/cOJOv6AoA/
=T27A
-----END PGP SIGNATURE-----